Labour Day Special - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: top65certs

All H12-321 Test Inside Huawei Questions

Page: 14 / 20
Total 536 questions

Huawei Certified Network Professional - Wireless Local Area Network- Constructing Enterprise WLAN Architecture Questions and Answers

Question 53

Which of the following measures are beneficial to guide wireless terminals to preferentially associate 5G bands?

Options:

A.

5G radio configuration transmission power is higher than 2.4G 3-8dB

B.

For the terminal to send a probe request to probe the AP, the AP preferentially responds to the probe on the 5G, and responds to the probe on the 2.4G after responding several times on the 5G.

C.

If the terminal initiates association with the 2.4G radio, the AP refuses to associate, and the association is allowed only after the number of rejections reaches a certain threshold. For the association on the 5G radio, the AP immediately allows the association.

D.

Configure the rate of the beacon on the 5G to be higher than the 2.4G radio. The beacon period is greater than the 2.4G radio. The number of probe retransmissions is less than 2.4G.

Question 54

Which of the following factors should be considered when engineers determine the antenna installation height in the long-distance point-to-point scenario? (Multiple Choice)

Options:

A.

Signal transmission frequency

B.

Distance between the receive and transmit antennas

C.

Antenna beamwidth

D.

Earth curvature

Question 55

What information can the Agile Controller deliver to the NAS device for right control? (Multiple Choice)

Options:

A.

VLAN

B.

ACL

C.

Static ARP entry

D.

Static routes

E.

Specific RADIUS attributes

Question 56

As shown in the figure, the WIDS attack detection process, after completing the dynamic blacklist, how does the AP handle different data traffic when it is in the blacklist penalty period?

Options:

A.

Forward normal data traffic and discard attack traffic

B.

Discard normal data traffic and report attack traffic

C.

Forward normal data traffic and report attack traffic

D.

Drop normal data traffic and discard attack traffic

Page: 14 / 20
Total 536 questions